{"id":4230,"date":"2023-06-29T10:49:31","date_gmt":"2023-06-29T09:49:31","guid":{"rendered":"https:\/\/www.calligo.io\/insights\/\/"},"modified":"2024-01-17T16:24:17","modified_gmt":"2024-01-17T16:24:17","slug":"security-sos-dangerous-to-view-cloud-and-data-separately","status":"publish","type":"post","link":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/","title":{"rendered":"Security SOS: It&#8217;s dangerous to view cloud and data separately"},"content":{"rendered":"\n<p>Security risks within the IT infrastructure of global businesses are increasingly prevalent \u2013 and damaging. When swathes of data are separated in the hybrid or multi cloud, it can leave big open doorways for malware to walk right in.<\/p>\n\n\n\n<p><strong>The message I want businesses to hear is that cloud and data are not separate. IT only exists to service the needs of a business\u2019 data. Securing cloud services \u2013 and therefore your data \u2013 is a business-critical issue.<\/strong><\/p>\n\n\n\n<p><strong>Read on to understand:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>The limitations of AV<\/li>\n\n\n\n<li>The dangers of remote networks<\/li>\n\n\n\n<li>The cost of getting security wrong<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>1. Blind faith in AV<\/strong><\/h2>\n\n\n\n<p>Businesses are too often putting their faith in antivirus (AV) software. This is unintentional blind faith, in my opinion. The problem with AV software alone is that it does not go far enough to protect businesses data assets; it only detects known threats and is not reliable against new variants. We speak to a lot of businesses that assume their security box is ticked, thanks to AV software alone.<\/p>\n\n\n\n<p>But what about zero-day attacks that make up most data breaches these days? A zero-day vulnerability is a computer security vulnerability unknown by anti-virus software creators; they&#8217;ve had \u20180\u2019 days to work on a security patch or an update to fix the issue. Zero-day attacks leverage innovative multi-layered approaches \u2013 like BitLocker encryption &#8211; that haven\u2019t been seen before; anomalies that business software can\u2019t easily detect and protect against without human intervention.<\/p>\n\n\n\n<p>The need to have human and AI based security operations centers (SOC) is increasing, but the cost to implement internally is high and the skills are in short supply. This can cause complications when trying to get pay-outs from cyber security insurers \u2013 because businesses haven\u2019t invested in a higher level of threat protection.<\/p>\n\n\n\n<p><strong>Against this backdrop, AV is like wearing chain mail with a gaping hole in the front.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>2. Leaving doors open in our remote working world<\/strong><\/h2>\n\n\n\n<p>Unsurprisingly, zero-day vulnerability is greater in our remote working world. Weaker control systems, attacks on remote working infrastructure, sensitive data accessed through unsecured Wi-Fi networks, expanded attack surfaces, the use of personal devices\u2026The list goes on. SaaS in one corner, Office 365 and Dynamic CRM in the other. Servers, software and data \u2013 here, there and everywhere. Not to mention outdated legacy operating systems.<\/p>\n\n\n\n<p>Businesses have previously relied on remote access virtual private networks (VPN) for users \u2013 but this creates a tunnel between devices and company networks that\u2019s hard to secure adequately. It also means a laptop or personal device can easily become a conduit. A virus or malware can scan for open communication channels \u2013 and find its way easily into a corporate environment. If your business IT environment has modern applications, your security must also be modernised. And fast.<\/p>\n\n\n\n<p>This is where Zero Trust Network Access can come into play to secure access to internal applications for remote users. ZTNA gives remote users connectivity to private apps without placing them on external network tunnels or exposing the apps directly to the internet.<\/p>\n\n\n\n<p><strong>It\u2019s about changing the architecture to be as secure as possible for the modern way we work.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3. The financial \u2013 and reputational &#8211; costs<\/strong><\/h2>\n\n\n\n<p>Under British data protection laws, for example, a company could also face a fine of up to 4% of its global turnover if it is found to have failed to have met its data protection duties by the Information Commissioner&#8217;s Office (ICO). This is not new news. But despite the serious risk this poses to a business, many organisations still have an \u2018it won\u2019t happen to me\u2019 attitude.<\/p>\n\n\n\n<p>Zero-day attacks \u2013 or any type of data breach &#8211; can be hugely costly for a company. We know, because we we\u2019ve had big business customers who\u2019ve been in this predicament (not on our watch, I hasten to add!). Add into the mix <a href=\"https:\/\/www.calligo.io\/services\/gdpr\/\">GDPR<\/a> \u2013 and uninformed reliance on AV and cyber insurance and a lack of control over remote networks has landed many in trouble with the regulators. Hefty fines \u2013 and reputational damage.<\/p>\n\n\n\n<p><strong>Businesses that value their data need to value security, first and foremost. And that starts in the cloud.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Businesses often view cloud and data as separate. And yet, IT only exists to service the needs of a business\u2019 data. Securing cloud services is therefore a business-critical issue.<\/p>\n","protected":false},"author":34,"featured_media":4247,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,138,139,31,121],"tags":[50,47,48,52,51,53,49],"post_format_type":[40],"class_list":["post-4230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-cloud-migration","category-cloud-strategy","category-data-insights","category-glossary","tag-antivirus","tag-cloud","tag-data","tag-data-insights","tag-data-security","tag-it-infrastructure","tag-microsoft-office-365"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security SOS: It&#039;s dangerous to view cloud and data separately<\/title>\n<meta name=\"description\" content=\"Cloud &amp; data are often viewed separately. IT only exists to service the needs of data. Securing cloud services is a business-critical issue.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security SOS: It&#039;s dangerous to view cloud and data separately\" \/>\n<meta property=\"og:description\" content=\"Cloud &amp; data are often viewed separately. IT only exists to service the needs of data. Securing cloud services is a business-critical issue.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/\" \/>\n<meta property=\"og:site_name\" content=\"Calligo\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-29T09:49:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-17T16:24:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/06\/Cloud-and-Data-separately-blog-image-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1908\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cynthia Hoza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@calligocloud\" \/>\n<meta name=\"twitter:site\" content=\"@calligocloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cynthia Hoza\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/\"},\"author\":{\"name\":\"Cynthia Hoza\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/3a89e8c6dff018d5a89199959070b25f\"},\"headline\":\"Security SOS: It&#8217;s dangerous to view cloud and data separately\",\"datePublished\":\"2023-06-29T09:49:31+00:00\",\"dateModified\":\"2024-01-17T16:24:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/\"},\"wordCount\":694,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.calligo.io\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/06\/Cloud-and-Data-separately-blog-image-scaled.jpg\",\"keywords\":[\"antivirus\",\"cloud\",\"data\",\"data insights\",\"data security\",\"IT infrastructure\",\"microsoft office 365\"],\"articleSection\":[\"Cloud\",\"Cloud Migration\",\"Cloud Strategy\",\"Data Insights\",\"Glossary\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/\",\"url\":\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/\",\"name\":\"Security SOS: It's dangerous to view cloud and data separately\",\"isPartOf\":{\"@id\":\"https:\/\/www.calligo.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/06\/Cloud-and-Data-separately-blog-image-scaled.jpg\",\"datePublished\":\"2023-06-29T09:49:31+00:00\",\"dateModified\":\"2024-01-17T16:24:17+00:00\",\"description\":\"Cloud & data are often viewed separately. IT only exists to service the needs of data. Securing cloud services is a business-critical issue.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#primaryimage\",\"url\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/06\/Cloud-and-Data-separately-blog-image-scaled.jpg\",\"contentUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/06\/Cloud-and-Data-separately-blog-image-scaled.jpg\",\"width\":2560,\"height\":1908,\"caption\":\"Cloud and data separately\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.calligo.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security SOS: It&#8217;s dangerous to view cloud and data separately\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.calligo.io\/#website\",\"url\":\"https:\/\/www.calligo.io\/\",\"name\":\"Calligo\",\"description\":\"Building value through data\",\"publisher\":{\"@id\":\"https:\/\/www.calligo.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.calligo.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.calligo.io\/#organization\",\"name\":\"Calligo\",\"url\":\"https:\/\/www.calligo.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg\",\"contentUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Calligo\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/calligocloud\",\"https:\/\/www.linkedin.com\/company\/calligo-limited\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/3a89e8c6dff018d5a89199959070b25f\",\"name\":\"Cynthia Hoza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/905b41cc3a17c6a46ed078778724625e6b131732c17ff59874c3214b06b985a1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/905b41cc3a17c6a46ed078778724625e6b131732c17ff59874c3214b06b985a1?s=96&d=mm&r=g\",\"caption\":\"Cynthia Hoza\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security SOS: It's dangerous to view cloud and data separately","description":"Cloud & data are often viewed separately. IT only exists to service the needs of data. Securing cloud services is a business-critical issue.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/","og_locale":"en_GB","og_type":"article","og_title":"Security SOS: It's dangerous to view cloud and data separately","og_description":"Cloud & data are often viewed separately. IT only exists to service the needs of data. Securing cloud services is a business-critical issue.","og_url":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/","og_site_name":"Calligo","article_published_time":"2023-06-29T09:49:31+00:00","article_modified_time":"2024-01-17T16:24:17+00:00","og_image":[{"width":2560,"height":1908,"url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/06\/Cloud-and-Data-separately-blog-image-scaled.jpg","type":"image\/jpeg"}],"author":"Cynthia Hoza","twitter_card":"summary_large_image","twitter_creator":"@calligocloud","twitter_site":"@calligocloud","twitter_misc":{"Written by":"Cynthia Hoza","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#article","isPartOf":{"@id":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/"},"author":{"name":"Cynthia Hoza","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/3a89e8c6dff018d5a89199959070b25f"},"headline":"Security SOS: It&#8217;s dangerous to view cloud and data separately","datePublished":"2023-06-29T09:49:31+00:00","dateModified":"2024-01-17T16:24:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/"},"wordCount":694,"commentCount":0,"publisher":{"@id":"https:\/\/www.calligo.io\/#organization"},"image":{"@id":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#primaryimage"},"thumbnailUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/06\/Cloud-and-Data-separately-blog-image-scaled.jpg","keywords":["antivirus","cloud","data","data insights","data security","IT infrastructure","microsoft office 365"],"articleSection":["Cloud","Cloud Migration","Cloud Strategy","Data Insights","Glossary"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/","url":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/","name":"Security SOS: It's dangerous to view cloud and data separately","isPartOf":{"@id":"https:\/\/www.calligo.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#primaryimage"},"image":{"@id":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#primaryimage"},"thumbnailUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/06\/Cloud-and-Data-separately-blog-image-scaled.jpg","datePublished":"2023-06-29T09:49:31+00:00","dateModified":"2024-01-17T16:24:17+00:00","description":"Cloud & data are often viewed separately. IT only exists to service the needs of data. Securing cloud services is a business-critical issue.","breadcrumb":{"@id":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#primaryimage","url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/06\/Cloud-and-Data-separately-blog-image-scaled.jpg","contentUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/06\/Cloud-and-Data-separately-blog-image-scaled.jpg","width":2560,"height":1908,"caption":"Cloud and data separately"},{"@type":"BreadcrumbList","@id":"https:\/\/www.calligo.io\/insights\/data-insights\/security-sos-dangerous-to-view-cloud-and-data-separately\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.calligo.io\/"},{"@type":"ListItem","position":2,"name":"Security SOS: It&#8217;s dangerous to view cloud and data separately"}]},{"@type":"WebSite","@id":"https:\/\/www.calligo.io\/#website","url":"https:\/\/www.calligo.io\/","name":"Calligo","description":"Building value through data","publisher":{"@id":"https:\/\/www.calligo.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.calligo.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.calligo.io\/#organization","name":"Calligo","url":"https:\/\/www.calligo.io\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/","url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg","contentUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg","width":1200,"height":630,"caption":"Calligo"},"image":{"@id":"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/calligocloud","https:\/\/www.linkedin.com\/company\/calligo-limited\/"]},{"@type":"Person","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/3a89e8c6dff018d5a89199959070b25f","name":"Cynthia Hoza","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/905b41cc3a17c6a46ed078778724625e6b131732c17ff59874c3214b06b985a1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/905b41cc3a17c6a46ed078778724625e6b131732c17ff59874c3214b06b985a1?s=96&d=mm&r=g","caption":"Cynthia Hoza"}}]}},"_links":{"self":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts\/4230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/comments?post=4230"}],"version-history":[{"count":0,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts\/4230\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/media\/4247"}],"wp:attachment":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/media?parent=4230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/categories?post=4230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/tags?post=4230"},{"taxonomy":"post_format_type","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/post_format_type?post=4230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}